Glossary

A comprehensive glossary of key cybersecurity terms, including encryption, phishing, and intrusion detection systems, to enhance your security knowledge

Spoofing

Spoofing is any act where an attacker disguises as a trusted entity and wins the victim’s trust so he can execute malicious actions.

Read more: What Is Spoofing | Cybersecurity | CompTIA 

SQLi

SQL injection (Structured Query Language Injection) is a code injection attack where unauthorized database commands are performed on a victim’s SQL database.

Read more: What is SQL Injection (SQLi) and How to Prevent Attacks (acunetix.com) 

SSL

SSL, short for Secure Sockets Layer, is the protocol used to establish a secure communication between the web server and the web client. It can also be used to secure email, VoIP, and other communications over unsecured networks.

Read more: How does SSL work? | SSL certificates and TLS | Cloudflare 

SSRF

SSRF, short for Server-Side Request Forgery, is a common cyber-attack which allows a hacker to exploit the functionality of a server. This vulnerability is highly threatening because it can be used to target internal systems protected by firewalls and inaccessible by an external network.

Read more: What is server-side request forgery (SSRF)? | Acunetix 

Threat

Any event that can adversely affect an organization’s operations or assets through unauthorized access through an information system.

Read more: Cyber Threat – Glossary | CSRC (nist.gov) 

Vulnerability

A vulnerability is a mistake in a software that can be directly exploited by a cybercriminal to gain unauthorized access to a system.

Read more: vulnerability – Glossary | CSRC (nist.gov) 

Vulnerability Scanning 

Vulnerability scanning is an activity that identifies and reports any vulnerabilities present in a system that a hacker can exploit.

Read more: Penetration testing vs vulnerability scanning | Acunetix 

WAF 

Web Application Firewall (WAF) is a security tool used to secure web applications from common cyber-attacks by filtering and monitoring HTML traffic entering a web application.

Read more: What is a WAF? | Web Application Firewall explained | Cloudflare 

Weakness

A weakness is a flaw or error in a software or hardware system that can create a vulnerability if left unevaluated.

Read more: CWE – Frequently Asked Questions (FAQ) (mitre.org) 

XSS

Cross-site scripting (XSS) is a type of injection attack where malicious scripts are injected into a web browser of a victim. The actual attack occurs when the victim visits the web page or web application that executes the malicious code.

Read more: What is Cross-site Scripting and How Can You Fix it? (acunetix.com) 

Zero-Day Exploit 

A zero-day exploit is a software vulnerability discovered and exploited by a hacker before it’s been known to the party interested in fixing it.

Read more: What is a zero-day exploit? | Norton 

eBuilder Security Customer Support

Let us show you how we can help your organization

For starters, we can show how to improve upon your existing security in 30 mins. Care to proceed?